Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 14.943666] ================================================================== [ 14.944263] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 14.946302] Write of size 1 at addr fff00000c6417473 by task kunit_try_catch/136 [ 14.946627] [ 14.948880] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 14.949133] Tainted: [N]=TEST [ 14.949169] Hardware name: linux,dummy-virt (DT) [ 14.949960] Call trace: [ 14.950382] show_stack+0x20/0x38 (C) [ 14.950579] dump_stack_lvl+0x8c/0xd0 [ 14.950654] print_report+0x118/0x5d0 [ 14.950729] kasan_report+0xdc/0x128 [ 14.950775] __asan_report_store1_noabort+0x20/0x30 [ 14.950828] kmalloc_oob_right+0x5a4/0x660 [ 14.950874] kunit_try_run_case+0x170/0x3f0 [ 14.950925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.950976] kthread+0x328/0x630 [ 14.951030] ret_from_fork+0x10/0x20 [ 14.951231] [ 14.951300] Allocated by task 136: [ 14.951447] kasan_save_stack+0x3c/0x68 [ 14.951543] kasan_save_track+0x20/0x40 [ 14.951589] kasan_save_alloc_info+0x40/0x58 [ 14.951627] __kasan_kmalloc+0xd4/0xd8 [ 14.951671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.952251] kmalloc_oob_right+0xb0/0x660 [ 14.952405] kunit_try_run_case+0x170/0x3f0 [ 14.952448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.952511] kthread+0x328/0x630 [ 14.952543] ret_from_fork+0x10/0x20 [ 14.952610] [ 14.952676] The buggy address belongs to the object at fff00000c6417400 [ 14.952676] which belongs to the cache kmalloc-128 of size 128 [ 14.953082] The buggy address is located 0 bytes to the right of [ 14.953082] allocated 115-byte region [fff00000c6417400, fff00000c6417473) [ 14.953200] [ 14.953317] The buggy address belongs to the physical page: [ 14.953864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 14.954703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.955458] page_type: f5(slab) [ 14.956305] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.956430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.956573] page dumped because: kasan: bad access detected [ 14.956616] [ 14.956642] Memory state around the buggy address: [ 14.957163] fff00000c6417300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.957347] fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957499] >fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.957555] ^ [ 14.957851] fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957902] fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.958087] ================================================================== [ 14.966947] ================================================================== [ 14.967001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 14.967050] Read of size 1 at addr fff00000c6417480 by task kunit_try_catch/136 [ 14.967097] [ 14.967128] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.967206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.967260] Hardware name: linux,dummy-virt (DT) [ 14.967291] Call trace: [ 14.967318] show_stack+0x20/0x38 (C) [ 14.967367] dump_stack_lvl+0x8c/0xd0 [ 14.967412] print_report+0x118/0x5d0 [ 14.967457] kasan_report+0xdc/0x128 [ 14.967502] __asan_report_load1_noabort+0x20/0x30 [ 14.967561] kmalloc_oob_right+0x5d0/0x660 [ 14.967607] kunit_try_run_case+0x170/0x3f0 [ 14.967654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.967716] kthread+0x328/0x630 [ 14.967757] ret_from_fork+0x10/0x20 [ 14.967826] [ 14.967866] Allocated by task 136: [ 14.968132] kasan_save_stack+0x3c/0x68 [ 14.968197] kasan_save_track+0x20/0x40 [ 14.968310] kasan_save_alloc_info+0x40/0x58 [ 14.968434] __kasan_kmalloc+0xd4/0xd8 [ 14.968497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.968652] kmalloc_oob_right+0xb0/0x660 [ 14.968776] kunit_try_run_case+0x170/0x3f0 [ 14.968903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.969041] kthread+0x328/0x630 [ 14.969166] ret_from_fork+0x10/0x20 [ 14.969255] [ 14.969459] The buggy address belongs to the object at fff00000c6417400 [ 14.969459] which belongs to the cache kmalloc-128 of size 128 [ 14.969619] The buggy address is located 13 bytes to the right of [ 14.969619] allocated 115-byte region [fff00000c6417400, fff00000c6417473) [ 14.969682] [ 14.969713] The buggy address belongs to the physical page: [ 14.969741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 14.969917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.970053] page_type: f5(slab) [ 14.970129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.970223] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.970319] page dumped because: kasan: bad access detected [ 14.970413] [ 14.970443] Memory state around the buggy address: [ 14.970524] fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970632] fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.970678] >fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970783] ^ [ 14.971111] fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971210] fff00000c6417580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971294] ================================================================== [ 14.959475] ================================================================== [ 14.959517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 14.959755] Write of size 1 at addr fff00000c6417478 by task kunit_try_catch/136 [ 14.960184] [ 14.960267] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 14.960389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.960461] Hardware name: linux,dummy-virt (DT) [ 14.960493] Call trace: [ 14.960514] show_stack+0x20/0x38 (C) [ 14.960564] dump_stack_lvl+0x8c/0xd0 [ 14.960609] print_report+0x118/0x5d0 [ 14.960655] kasan_report+0xdc/0x128 [ 14.960711] __asan_report_store1_noabort+0x20/0x30 [ 14.960762] kmalloc_oob_right+0x538/0x660 [ 14.960807] kunit_try_run_case+0x170/0x3f0 [ 14.960855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.960908] kthread+0x328/0x630 [ 14.960949] ret_from_fork+0x10/0x20 [ 14.961267] [ 14.961357] Allocated by task 136: [ 14.961444] kasan_save_stack+0x3c/0x68 [ 14.961532] kasan_save_track+0x20/0x40 [ 14.961644] kasan_save_alloc_info+0x40/0x58 [ 14.961730] __kasan_kmalloc+0xd4/0xd8 [ 14.961765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 14.961831] kmalloc_oob_right+0xb0/0x660 [ 14.961865] kunit_try_run_case+0x170/0x3f0 [ 14.961901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 14.962182] kthread+0x328/0x630 [ 14.962247] ret_from_fork+0x10/0x20 [ 14.962339] [ 14.962418] The buggy address belongs to the object at fff00000c6417400 [ 14.962418] which belongs to the cache kmalloc-128 of size 128 [ 14.962547] The buggy address is located 5 bytes to the right of [ 14.962547] allocated 115-byte region [fff00000c6417400, fff00000c6417473) [ 14.962628] [ 14.962647] The buggy address belongs to the physical page: [ 14.962675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417 [ 14.962885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 14.962999] page_type: f5(slab) [ 14.963066] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 14.963124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.963199] page dumped because: kasan: bad access detected [ 14.963265] [ 14.963283] Memory state around the buggy address: [ 14.963322] fff00000c6417300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.963618] fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.963695] >fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.963801] ^ [ 14.964027] fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964077] fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964114] ==================================================================
[ 11.319079] ================================================================== [ 11.319655] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.319895] Read of size 1 at addr ffff888102fc3f80 by task kunit_try_catch/153 [ 11.320755] [ 11.321122] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.321173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.321185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.321206] Call Trace: [ 11.321219] <TASK> [ 11.321232] dump_stack_lvl+0x73/0xb0 [ 11.321269] print_report+0xd1/0x610 [ 11.321290] ? __virt_addr_valid+0x1db/0x2d0 [ 11.321311] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.321331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.321357] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.321377] kasan_report+0x141/0x180 [ 11.321397] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.321422] __asan_report_load1_noabort+0x18/0x20 [ 11.321444] kmalloc_oob_right+0x68a/0x7f0 [ 11.321464] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.321485] ? __schedule+0x10cc/0x2b60 [ 11.321506] ? __pfx_read_tsc+0x10/0x10 [ 11.321525] ? ktime_get_ts64+0x86/0x230 [ 11.321548] kunit_try_run_case+0x1a5/0x480 [ 11.321570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.321591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.321612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.321634] ? __kthread_parkme+0x82/0x180 [ 11.321653] ? preempt_count_sub+0x50/0x80 [ 11.321675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.321698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.321719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.321741] kthread+0x337/0x6f0 [ 11.321759] ? trace_preempt_on+0x20/0xc0 [ 11.321780] ? __pfx_kthread+0x10/0x10 [ 11.321799] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.321819] ? calculate_sigpending+0x7b/0xa0 [ 11.321842] ? __pfx_kthread+0x10/0x10 [ 11.321863] ret_from_fork+0x116/0x1d0 [ 11.321879] ? __pfx_kthread+0x10/0x10 [ 11.321898] ret_from_fork_asm+0x1a/0x30 [ 11.321927] </TASK> [ 11.321936] [ 11.330058] Allocated by task 153: [ 11.330248] kasan_save_stack+0x45/0x70 [ 11.330632] kasan_save_track+0x18/0x40 [ 11.330833] kasan_save_alloc_info+0x3b/0x50 [ 11.331171] __kasan_kmalloc+0xb7/0xc0 [ 11.331328] __kmalloc_cache_noprof+0x189/0x420 [ 11.331612] kmalloc_oob_right+0xa9/0x7f0 [ 11.331833] kunit_try_run_case+0x1a5/0x480 [ 11.332050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.332293] kthread+0x337/0x6f0 [ 11.332406] ret_from_fork+0x116/0x1d0 [ 11.332530] ret_from_fork_asm+0x1a/0x30 [ 11.332660] [ 11.332775] The buggy address belongs to the object at ffff888102fc3f00 [ 11.332775] which belongs to the cache kmalloc-128 of size 128 [ 11.333508] The buggy address is located 13 bytes to the right of [ 11.333508] allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73) [ 11.334141] [ 11.334261] The buggy address belongs to the physical page: [ 11.334641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3 [ 11.335026] flags: 0x200000000000000(node=0|zone=2) [ 11.335259] page_type: f5(slab) [ 11.335519] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.335857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.336205] page dumped because: kasan: bad access detected [ 11.336467] [ 11.336589] Memory state around the buggy address: [ 11.336914] ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.337242] ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.337550] >ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.338109] ^ [ 11.338265] ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.338476] ffff888102fc4080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 11.338788] ================================================================== [ 11.260775] ================================================================== [ 11.261477] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.262203] Write of size 1 at addr ffff888102fc3f73 by task kunit_try_catch/153 [ 11.262872] [ 11.264075] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.264487] Tainted: [N]=TEST [ 11.264522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.264735] Call Trace: [ 11.264798] <TASK> [ 11.264937] dump_stack_lvl+0x73/0xb0 [ 11.265040] print_report+0xd1/0x610 [ 11.265068] ? __virt_addr_valid+0x1db/0x2d0 [ 11.265093] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.265113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.265134] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.265154] kasan_report+0x141/0x180 [ 11.265175] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.265200] __asan_report_store1_noabort+0x1b/0x30 [ 11.265224] kmalloc_oob_right+0x6f0/0x7f0 [ 11.265245] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.265266] ? __schedule+0x10cc/0x2b60 [ 11.265289] ? __pfx_read_tsc+0x10/0x10 [ 11.265310] ? ktime_get_ts64+0x86/0x230 [ 11.265335] kunit_try_run_case+0x1a5/0x480 [ 11.265361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.265382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.265405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.265447] ? __kthread_parkme+0x82/0x180 [ 11.265468] ? preempt_count_sub+0x50/0x80 [ 11.265491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.265514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.265536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.265558] kthread+0x337/0x6f0 [ 11.265576] ? trace_preempt_on+0x20/0xc0 [ 11.265599] ? __pfx_kthread+0x10/0x10 [ 11.265618] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.265638] ? calculate_sigpending+0x7b/0xa0 [ 11.265664] ? __pfx_kthread+0x10/0x10 [ 11.265684] ret_from_fork+0x116/0x1d0 [ 11.265702] ? __pfx_kthread+0x10/0x10 [ 11.265721] ret_from_fork_asm+0x1a/0x30 [ 11.265780] </TASK> [ 11.265844] [ 11.277081] Allocated by task 153: [ 11.277538] kasan_save_stack+0x45/0x70 [ 11.277905] kasan_save_track+0x18/0x40 [ 11.278079] kasan_save_alloc_info+0x3b/0x50 [ 11.278545] __kasan_kmalloc+0xb7/0xc0 [ 11.278817] __kmalloc_cache_noprof+0x189/0x420 [ 11.279029] kmalloc_oob_right+0xa9/0x7f0 [ 11.279226] kunit_try_run_case+0x1a5/0x480 [ 11.279751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.279972] kthread+0x337/0x6f0 [ 11.280345] ret_from_fork+0x116/0x1d0 [ 11.280754] ret_from_fork_asm+0x1a/0x30 [ 11.281254] [ 11.281668] The buggy address belongs to the object at ffff888102fc3f00 [ 11.281668] which belongs to the cache kmalloc-128 of size 128 [ 11.282711] The buggy address is located 0 bytes to the right of [ 11.282711] allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73) [ 11.283686] [ 11.284088] The buggy address belongs to the physical page: [ 11.284981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3 [ 11.285899] flags: 0x200000000000000(node=0|zone=2) [ 11.286592] page_type: f5(slab) [ 11.287104] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.287416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.288155] page dumped because: kasan: bad access detected [ 11.288630] [ 11.288739] Memory state around the buggy address: [ 11.289580] ffff888102fc3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.289905] ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.290264] >ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.290894] ^ [ 11.291389] ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.291880] ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.292329] ================================================================== [ 11.294303] ================================================================== [ 11.294732] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.295117] Write of size 1 at addr ffff888102fc3f78 by task kunit_try_catch/153 [ 11.295834] [ 11.296138] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.296257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.296270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.296289] Call Trace: [ 11.296300] <TASK> [ 11.296314] dump_stack_lvl+0x73/0xb0 [ 11.296340] print_report+0xd1/0x610 [ 11.296361] ? __virt_addr_valid+0x1db/0x2d0 [ 11.296403] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.296423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.296461] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.296481] kasan_report+0x141/0x180 [ 11.296501] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.296525] __asan_report_store1_noabort+0x1b/0x30 [ 11.296548] kmalloc_oob_right+0x6bd/0x7f0 [ 11.296568] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.296589] ? __schedule+0x10cc/0x2b60 [ 11.296610] ? __pfx_read_tsc+0x10/0x10 [ 11.296629] ? ktime_get_ts64+0x86/0x230 [ 11.296652] kunit_try_run_case+0x1a5/0x480 [ 11.296674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.296695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.296716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.296737] ? __kthread_parkme+0x82/0x180 [ 11.296756] ? preempt_count_sub+0x50/0x80 [ 11.296777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.296799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.296821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.296843] kthread+0x337/0x6f0 [ 11.296861] ? trace_preempt_on+0x20/0xc0 [ 11.296882] ? __pfx_kthread+0x10/0x10 [ 11.296901] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.296921] ? calculate_sigpending+0x7b/0xa0 [ 11.296945] ? __pfx_kthread+0x10/0x10 [ 11.296965] ret_from_fork+0x116/0x1d0 [ 11.296989] ? __pfx_kthread+0x10/0x10 [ 11.297019] ret_from_fork_asm+0x1a/0x30 [ 11.297048] </TASK> [ 11.297057] [ 11.307253] Allocated by task 153: [ 11.307666] kasan_save_stack+0x45/0x70 [ 11.308025] kasan_save_track+0x18/0x40 [ 11.308317] kasan_save_alloc_info+0x3b/0x50 [ 11.308620] __kasan_kmalloc+0xb7/0xc0 [ 11.308765] __kmalloc_cache_noprof+0x189/0x420 [ 11.309224] kmalloc_oob_right+0xa9/0x7f0 [ 11.309390] kunit_try_run_case+0x1a5/0x480 [ 11.309671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.310128] kthread+0x337/0x6f0 [ 11.310255] ret_from_fork+0x116/0x1d0 [ 11.310633] ret_from_fork_asm+0x1a/0x30 [ 11.310797] [ 11.310953] The buggy address belongs to the object at ffff888102fc3f00 [ 11.310953] which belongs to the cache kmalloc-128 of size 128 [ 11.311772] The buggy address is located 5 bytes to the right of [ 11.311772] allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73) [ 11.312298] [ 11.312588] The buggy address belongs to the physical page: [ 11.312992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3 [ 11.313448] flags: 0x200000000000000(node=0|zone=2) [ 11.313898] page_type: f5(slab) [ 11.314059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.314617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.314983] page dumped because: kasan: bad access detected [ 11.315462] [ 11.315567] Memory state around the buggy address: [ 11.315894] ffff888102fc3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.316176] ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.316670] >ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.317095] ^ [ 11.317543] ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.318084] ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.318547] ==================================================================